The attached document is describing how to downgrade from 5.2.1. The upgrade guide of 5.2.1 was described as follows. From the 5.2.1 upgrade guide. Downgrading from VDS TC 5.2.1 If you need to downgrade from VDS TC 5.2.1 to a previous version of VDS TC, please contact Cisco TAC. Caution To be able to perform a roll back, you must perform this roll back within 7 days of the upgrade. you can download the document in CCO. http://www.cisco.com/c/dam/en/us/td/docs/video/videoscape/distribution_suite/vds/v5_2/VDS_TC_5_2_1_app_downgrade_guide.pdf
... View more

On January 27, 2015, a buffer overflow vulnerability in the GNU C library (glibc) was publicly announced. Affected Products Cisco is currently investigating its product line to determine which products may be affected and the extent of the impact of the vulnerability on its products. Additional Cisco products will be added as the investigation progresses. -Cisco Videoscape Distribution Suite Transparent Caching Workarounds There are currently no network-based mitigations for this vulnerability or any mitigations that can be performed directly on affected systems. Cisco has published an Event Response for this vulnerability: http://www.cisco.com/web/about/security/intelligen ce/ERP_GHOST_29-Jan-2015.html It seems that this vulnerability affect all Linux systems (redhat, centos, ubunt and so on..) which have glibc 2.18 or prior version. So we have checked all MGMT and CEs, confirmed that all servers are glibc 2.9 version as follows, you can use the following command on VDS-TC to checj the version of Glibc version. root@mg-1:/home/padmin> getconf –a | grep libc -------- this is mg-1 GNU_LIBC_VERSION glibc 2.9 this is ce-1 GNU_LIBC_VERSION glibc 2.9 this is ce-2 GNU_LIBC_VERSION glibc 2.9 this is ce-3 GNU_LIBC_VERSION glibc 2.9 Please refer to the following url for details. http://tools.cisco.com/security/center/content/Cis coSecurityAdvisory/cisco-sa-20150128-ghost?vs_f=Ci ... This issue already is escalated to BU and PA and waiting for the reply. Here is the latest update from PA. PA has agreed with the VDS-TC management team that a fix for this vulnerability will be available in release 6.0 which is planned to be released on Q3/2015. In release 6.0, the product will run on CentOS platform (instead of openSUSE as today) and the glibc library in use will have a fix for the glibc GHOST issue.
... View more

Log collecter from management server's GUI running 5.2.0GA is not completing collecting the log information. So customer or partner engineer needs to check whether the correct date logs are collected or not. If it is not complete, then customer or partner needs to collect log manually from each cache server. The following bugs are opened and it will be fixed in 5.2.1GA. Detail Description: Issue caused by running the log collector script as user "root". The script doesn't clean all the files and leaves them "root" permission on the file-system. When other users are activating the script the files that was created with "root" Permission are not collected. Cisco Defect ID: CSCur18670 Fix in version: 5.2.1 GA Detail Description: when collecting the log files, the last open log file was not collected, the fix include collecting the last open file. Cisco Defect ID: CSCur16624 Fix in version: 5.2.1 GA
... View more